Security Awareness Chapters 3 and 4

4 January 2024
4.4 (161 reviews)
65 test answers

Unlock all answers in this set

Unlock answers (61)
question
Does malware usually enter a computer system with the user's knowledge?
answer
No. Malware is software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action
question
What are the three types of malware that have the primary traits of circulation and/or infection?
answer
Viruses, worms, trojans
question
Which type of malware will hide or remove all traces of evidence that may reveal the malware, such as log entries?
answer
Rootkits
question
The type of malware that exploits a vulnerability on one system and then immediately searches for another computer on the network that has the same vulnerability?
answer
Worm
question
What is the name for a program that is advertised as performing one activity but actually does something else?
answer
Trojan Horse. They are an executable program that masquerades as performing a benign activity but also does something malicious.
question
What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?
answer
Keylogger
question
What type of malware can lock up a user's computer and then display a message that purports to come from a law enforcement agency that states the user must pay a fine for illegal activity?
answer
Ransomeware
question
An infected robot computer is known as a _____?
answer
Zombie
question
Botnets can flood a web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. What is this called?
answer
Denying services
question
Antivirus (AV) software on a computer must have its _____ files regularly updated by downloads from the Internet.
answer
Signature
question
Which windows feature provides information to users and obtains their approval before a program can make a change to the computer's settings?
answer
User Account Control (UAC)
question
Is it recommended that a copy of data backup be stored at an off-site location?
answer
Yes
question
The _____ is a worldwide set of interconnected computers, servers, and networks.
answer
World wide web
question
Web servers distribute HTML documents based on a set of standards, or protocols, known as the _____.
answer
Hypertext Transfer Protocol (HTTP)
question
HTTP is based on which larger set of standards for internet communication?
answer
Transmission Control Protocol/Internet Protocol (TCP/IP)
question
Using what email protocol can mail be organized into folders on the mail server and read from any device?
answer
Internet mail Access Protocol (IMAP)
question
What can be used to run JavaScript in a restricted environment and limit what resources it can access?
answer
Sandboxing
question
Which of the following expands the normal capabilities of a web browser for a specific webpage?
answer
Extensions
question
Which type of web browser enhancement can change browser menus or create additional toolbars?
answer
Add-ons
question
What standardizes sounds and video format so plug-ins like Flash are no longer needed?
answer
HTML5
question
What is it called when unsuspecting users visit an infected website and their browsers download code that targets a vulnerability in the user's browser?
answer
Drive by downloads
question
A(n) _____ is also called a Flash cookie, named after Adobe Flash.
answer
locally shared object (LSO)
question
What do web servers use to track whether a user has previously visited a web site?
answer
Cookies
question
What are the risks of first-party cookies vs. third-party cookies?
answer
Cookies pose security and privacy risks. First-party cookies can be stolen and used to impersonate the user, while third-party cookies can be used to track the browsing or buying habits of a user. When multiple websites are serviced by a single marketing organization , cookies can be used to track browsing habits on all the clients sites.
question
Using which internet security best practice is information not saves by the browser, such as pages that are visited will not be recorded to history or the address bar?
answer
Private browsing
question
A(n) _____ requires a user to transport it from one computer to another
answer
Virus
question
Which of these is NOT an action that a virus can take?
answer
transport itself through the network to another device
question
Which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency?
answer
ransomeware
question
Which of the following is not a type of malware that has as its primary trait circulation and/or infection?
answer
botnet
question
A user who installs a program that prints out coupons but in the background silently collects her passwords has installed a _____
answer
Trojan
question
Malware payload allows an attacker to execute virtually any command on the victim's computer; this is called _____
answer
arbitrary code execution
question
Which of these could NOT be defined as a logic bomb?
answer
Send spam email to all users in the company
question
What is access a computer, program, or service that circumvents any normal security protections called?
answer
backdoor
question
Which of these is a general term used for describing software that gathers information without the user's consent?
answer
spyware
question
Which statement regarding a keylogger is NOT true?
answer
Software keyloggers are easy to detect.
question
Botnets are composed of _____
answer
zombies
question
Each of the following is the reason why adware is scorned, except _____
answer
it displays the attackers programming skills
question
Each of the following is a typical feature of a fee-based Internet backup service except _____
answer
backup to an external hard drive
question
How many carriers must a virus have to replicate and attack?
answer
Two
question
Which level of UAC provides the lowest level of security?
answer
Never notify
question
Which of the following enhancements to software provides new or expanded function-ability but does not address security vulnerabilities?
answer
Feature update
question
Which type of firewall is an external hardware device?
answer
Network firewall
question
The database that contains the sequence of characters of a virus is called the _____
answer
signature file
question
Each of the following is a question that the user should ask regarding data backups except _____
answer
Who should do the backup?
question
A _____ is a downloadable image that can be used to scan a computer for malware.
answer
Rescue disc
question
Each of the following is true about the internet except:
answer
It is a local network of computers and networks
question
What is the format used to write webpages?
answer
Hypertext Markup Language (HTML)
question
Which of the following is the more recent and advanced electronic email system?
answer
Internet Mail Access Protocol (IMAP)
question
Which is the most popular scripting code used with webpages?
answer
JavaScript
question
Each of the following is an addition that could be added to a web browser to support dynamic browsing except _____
answer
Java
question
A cookie that was not created b the website that attempts to access it is called
answer
third-party cookie
question
Which of the following web browser additions provides links to external programs?
answer
plug-in
question
How does an attacker use a malvertising attack?
answer
Attackers may infect the third-party advertising networks so that their malware is distributed through ads sent to user's web browsers.
question
A _____ is a list of email addresses from senders from whom you do not want to receive messages.
answer
blacklist
question
Which of the following is true about a cookie?
answer
It can pose a security and privacy risk
question
Bob's computer was infected from a drive-by download attack, What did Bob do to get infected?
answer
He viewed a website
question
Which type of cookie is the most complex?
answer
locally shared object (LSO)
question
What technique do attackers use in order to circumvent text-based spam filters?
answer
image spam
question
What is the first step in defending against Internet-based attacks?
answer
Ensure that the computer itself is properly secured
question
Why should you not click on an embedded hyperlink?
answer
They can take you to a different website other than what is being advertised
question
A reading pane allows the user to read an email message _____
answer
without actually opening it
question
The most secure option when configuring a web browser for security is _____
answer
deny first-party and third-party cookies
question
Which of the following is not a web browser addition to enhance security?
answer
local intranet flash signal
question
Why would you want to block external content from downloading into your email client?
answer
To prevent spammers from knowing that you email address is valid
question
Which of the following is not a secure internet practice?
answer
Run JavaScript code to prevent attacks